Tải bản đầy đủ (.pdf) (497 trang)

CCNA 101 labs có lời giải

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.86 MB, 497 trang )

pandazip.com

101 CCNA
Labs with
solutions
LAYOUT BY JOE MENDOLA

1


Local Area Networks
Lab 001: Configuring standard VLANs on
Catalyst Switches
Lab 002: Configuring extended VLANs on
Catalyst Switches
Lab 003: Configuring VTP Clients and
Servers on Catalyst Switches
Lab 004: Configuring VTP Transparent
Mode
Lab 005: Securing VTP Domains
Lab 006: Verifying Spanning-Tree Port
States on Catalyst Switches
Lab 007: Spanning-Tree Protocol Root
Bridges Manually
Lab 008: Spanning-Tree Protocol Root
Bridges using the IOS Macro
Lab 009: Assigning Multiple Instances to a
VLAN Simultaneously
Lab 010: Configuring Spanning-Tree
Protocol for Access ports
Lab 011: Configuring switch Access port


security
Lab 012: Configuring advanced switch
Access port security
Lab 013: Configuring advanced static
switch Access port security
Lab 014: Enabling Rapid Per-VLAN
Spanning Tree
Lab 015: Configuring and allowing interVLAN routing
Lab 016: Restricting VLANs on Trunks and
changing the VTP version
Lab 017: Configuring a default gateway for
routers and switches
Lab 018: Permitting Telnet access to
Catalyst Switches
Lab 019: Configuring passwords on
Catalyst Switches
Wide Area Networks
Lab 020: Configuring back-to-back Serial
connections
Lab 021: Verifying Cisco HDLC
Encapsulation
Lab 022: Configuring PPP Encapsulation
Lab 023: PPP Authentication using PAP
Lab 024: PPP Authentication using CHAP Method 1
Lab 025: PPP Authentication using CHAP Method 2

Lab 026: Configuring Cisco Frame Relay
Lab 027: Configuring IETF Frame Relay
Lab 028: Configuring Static Frame Relay
Maps

Lab 029: Configuring Frame Relay point-topoint Subinterfaces
Lab 030: Configuring Frame Relay
Multipoint Subinterfaces
IP Routing
Lab 031: Configuring Static Routing via
Interfaces
Lab 032: Configuring Static Routing via IP
addresses
Lab 033: Configuring and Naming Static
Routes
Lab 034: Configuring Default Static Routes
Lab 035: Configuring RIP version
Lab 036: RIPv2 Automatic Summarization
Lab 037: Debugging and Verifying RIP
version 2 Updates
Lab 038: Passive Interfaces for RIPv2
Updates
Lab 039: Summarizing Routes with RIPv2
Lab 040: RIPv2 Split Horizon
Lab 041: Configuring Basic EIGRP Routing
Lab 042: Configuring EIGRP Routing Using
Wildcard Masks
Lab 043: EIGRP Automatic Summarization
Lab 044: Passive Interfaces for EIGRP
Updates
Lab 045: Summarizing Routes with EIGRP
Lab 046: Verifying the EIGRP Database
Lab 047: EIGRP Split Horizon
Lab 048: Configuring OSPF on Point-toPoint Networks
Lab 049: Configuring OSPF on Broadcast

Networks
Lab 050: Configuring OSPF on NonBroadcast Networks
Lab 051: Configuring OSPF Point-toMultipoint Networks
Lab 052: Configuring Multi-Area OSPF
Lab 053: Manually configuring the OSPF
router ID
Lab 054: Debugging OSPF Adjacencies

2


Access Control Lists
Lab 055: Configuring and Applying
Standard Numbered ACLs
Lab 056: Configuring and Applying
Standard Named ACLs
Lab 057: Configuring and Applying
Extended Numbered ACLs Inbound
Lab 058: Configuring and Applying
Extended Named ACLs Inbound
Lab 059: Configuring and Applying
Extended Numbered ACLs
Lab 060: Configuring and Applying
Extended Named ACLs Outbound
Lab 061: Restricting Inbound Telnet Access
using Extended ACLs
Lab 062: Restricting Outbound Telnet
Access using Extended ACLs
Lab 063: Debugging Network Traffic Using
Extended ACLs

Lab 064: Logging ACL Matches
Network Address Translation
Lab 065: Configuring Static Network
Address Translation
Lab 066: Configuring Dynamic Network
Address Translation
Lab 067: Configuring interface-based Port
Address Translation
Lab 068: Configuring pool-based Port
Address Translation
Dynamic Host Configuration Protocol
Lab 069: Configuring IOS DHCP Clients
Lab 070: Configuring IOS DHCP Server
Lab 071: Forwarding DHCP requests to
remote DHCP Servers
IP and IOS Features
Lab 072: Configuring command aliases in
IOS devices
Lab 073: Configuring Local Name
Resolution on IOS devices
Lab 074: Configuring Domain Name
Resolution on IOS devices
Lab 075: Configuring IOS Device Logging to
a SYSLOG server
Lab 076: Configuring User Privileges on IOS
Devices
Lab 077: Configuring Command &
Password privilege Levels on devices

Lab 078: Configuring MOTD Banners

Lab 079: Enabling HTTP access to IOS
devices
Lab 080: Changing the Configuration
Register on IOS devices
Lab 081: Cisco Discovery Protocol
Cisco Router and Security Device Manager
Lab 082: Configuring Cisco IOS routers for
SDM
Lab 083: Using Cisco SDM to configure IP
interfaces
Lab 084: Using Cisco SDM to configure
Multi-Area OSPF Routing
Lab 085: Using Cisco SDM to configure IP
EIGRP Routing
Lab 086: Using Cisco SDM to configure RIP
version 2 Routing
Lab 087: Using Cisco SDM to configure and
apply extended ACLs
Lab 088: Using Cisco SDM to configure
Cisco IOS DHCP Server
Lab 089: Using Cisco SDM to configure DNS
servers
Lab 090: Using Cisco SDM to configure
Network Address Translation
Lab 091: Using Cisco SDM to configure Port
Address Translation
Lab 092: Using Cisco SDM to manager
users, passwords and privileges
Lab 093: Using Cisco SDM to restrict Telnet
and SSH access to routers

Lab 094: Managing configuration files with
Cisco SDM
Challenge Labs
Challenge Lab 1: DHCP, inter-VLAN routing
and RIPv2
Challenge Lab 2: VTP, STP and OSPF
Challenge Lab 3: EIGRP, PAT, ACLs and
Banners
Challenge Lab 4: Multi-Area OSPF, Frame
Relay, LAN Switching
Challenge Lab 5: EIGRP Summarization,
Static NAT, ACLs
Challenge Lab 6: PPP Authentication, Static
Routing, DNS, SYSLOG
Challenge Lab 7: Subnetting,
Summarization, Static Routing and ACLs
3


Lab 1: Configuring standard VLANs on Catalyst Switches
Lab Objective:
The objective of this lab exercise is for you to learn and understand how to configure standard
VLANs 1-1001 on Cisco Catalyst IOS switches. In addition to this, you are also required to
familiarize yourself with the commands available in Cisco IOS to validate and check your
configurations.
Lab Purpose:
VLAN configuration is a fundamental skill. VLANs allow you to segment your network into
multiple, smaller broadcast domains. As a Cisco engineer, as well as in the Cisco CCNA exam,
you will be expected to know how to configure VLANs on Cisco switches.
Certification Level:

This lab is suitable for both CCENT and CCNA certification exam preparation
Lab Difficulty:
This lab has a difficulty rating of 4/10
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than
10 minutes
Lab Topology:
Please use the following topology to complete this lab exercise:

Task 1:
In preparation for VLAN configuration, configure a hostname on Sw1 as well as the VLANs
depicted in the topology.

4


Task 2:
Configure ports FastEthernet0/5 – FastEthernet0/8 as access ports and assign them to the
VLANs specified.
Task 3:
Verify your VLAN configuration using relevant show commands in Cisco IOS.

SOLUTION:
Lab 1 Configuration and Verification
Task 1:
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw1
Sw1(config)#vlan 10
Sw1(config-vlan)#name SALES

Sw1(config-vlan)#exit
Sw1(config)#vlan 20
Sw1(config-vlan)#name MANAGERS
Sw1(config-vlan)#exit
Sw1(config)#vlan 30
Sw1(config-vlan)#name ENGINEERS
Sw1(config-vlan)#exit
Sw1(config)#vlan 40
Sw1(config-vlan)#name SUPPORT
NOTE: By default, Cisco switches are VTP servers so no configuration is necessary for
Server mode. Use the show vtp status command to look at the current VTP operating mode
of the switch.
Task 2:
Sw1(config)#interface fastethernet0/5
Sw1(config-if)#switchport mode access

5


Sw1(config-if)#switchport access vlan 10
Sw1(config-if)#exit
Sw1(config)#interface fastethernet0/6
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 20
Sw1(config-if)#exit
Sw1(config-if)#interface fastethernet0/7
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 30
Sw1(config-if)#exit
Sw1(config-if)#interface fastethernet0/8

Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 40
Task 3:
Sw1#show vlan brief
VLAN Name

Status

Ports

---- -------------------------------- --------- ------------------------------1

default

active
Fa0/9,

Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/10, Fa0/11, Fa0/12

Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gi0/1,

Gi0/2

active

Fa0/5


10

SALES

20

MANAGERS

active

Fa0/6

30

ENGINEERS

active

Fa0/7

40

SUPPORT

active

Fa0/8

6



1002 fddi-default

active

1003 token-ring-default

active

1004 fddinet-default

active

1005 trnet-default

active

Lab 2: Configuring extended VLANs on Catalyst Switches
Lab Objective:
The objective of this lab exercise is for you to learn and understand how to configure extended
VLANs 1006-4096 on Cisco Catalyst IOS switches. In addition to this, you are also required to
familiarize yourself with the commands available in Cisco IOS to validate and check your
configurations.
Lab Purpose:
VLAN configuration is a fundamental skill. VLANs allow you to segment your network into
multiple, smaller broadcast domains. As a Cisco engineer, as well as in the Cisco CCNA exam,
you will be expected to know how to configure VLANs on Cisco switches.
Certification Level:
This lab is suitable for both CCENT and CCNA certification exam preparation

Lab Difficulty:
This lab has a difficulty rating of 5/10
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than
10 minutes
Lab Topology:
Please use the following topology to complete this lab exercise:

7


Task 1:
In preparation for VLAN configuration, configure a hostname on Sw1 as well as the VLANs
depicted in the topology. Keep in mind that extended VLANs can only be configured on a
switch in VTP Transparent mode.
Task 2:
Configure ports FastEthernet0/5 – FastEthernet0/8 as access ports and assign them to the
VLANs specified.
Task 3:
Verify your VLAN configuration
SOLUTION:
Lab 2 Configuration and Verification
Task 1:
NOTE: By default, Cisco switches are VTP servers. Only standard range VLANS 1-1005 are
configurable on VTP servers. To configure extended range VLANS (1006-4096) you must
configure the switch as a VTP Transparent switch. Otherwise, you will get the following error
message:
Sw1(config)#vlan 2010
Sw1(config-vlan)#end
Extended VLANs not allowed in VTP SERVER mode

Failed to commit extended VLAN(s) changes.
NOTE: Configuration files will be kept from previous labs. In order to remove them you can
re-type the commands with the word 'no' in front.:
Sw1(config)#no vlan 2010
You may also need to reset the switch back to VTP mode server if appropriate.
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw1
Sw1(config)#vtp mode transparent
Setting device to VTP TRANSPARENT mode.
Sw1(config)#vlan 2010
Sw1(config-vlan)#name SALES
Sw1(config-vlan)#exit
Sw1(config)#vlan 2020

8


Sw1(config-vlan)#name MANAGERS
Sw1(config-vlan)#exit
Sw1(config)#vlan 2030
Sw1(config-vlan)#name ENGINEERS
Sw1(config-vlan)#exit
Sw1(config)#vlan 2040
Sw1(config-vlan)#name SUPPORT
Task 2:
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#interface fastethernet0/5
Sw1(config-if)#switchport mode access

Sw1(config-if)#switchport access vlan 2010
Sw1(config-if)#exit
Sw1(config)#interface fastethernet0/6
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 2020
Sw1(config-if)#exit
Sw1(config-if)#interface fastethernet0/7
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 2030
Sw1(config-if)#exit
Sw1(config-if)#interface fastethernet0/8
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 2040

9


Task 3:
Sw1#show vlan brief
VLAN
---1

1002 fddi-default
1003 token-ringdefault
1004 fddinet-default
1005 trnet-default
2010
2020
2030
2040


Name
Status Ports
-------------------------------- --------- ------------------------------default
active
Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/9,Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15,
Fa0/16
Fa0/17, Fa0/18, Fa0/19,
Fa0/20
Fa0/21, Fa0/22, Fa0/23,
Fa0/24
Gi0/1, Gi0/2
active
active

SALES
MANAGERS
ENGINEERS
SUPPORT

active
active
active
active
active
active

Fa0/5

Fa0/6
Fa0/7
Fa0/8

Lab 3: Configuring VTP Clients and Servers on Catalyst Switches
Lab Objective:
The objective of this lab exercise is for you to learn and understand how to configure VTP
Server and Client mode on Cisco Catalyst switches. By default, all Cisco switches are VTP
Server devices.
Lab Purpose:
VTP Client and Server mode configuration is a fundamental skill. VLANs are configured on VTP
Servers and VTP Clients receive VLAN information from the VTP Servers in the same VTP
domain. VLAN sharing is possible by using a trunk between the switches. As a Cisco engineer,
as well as in the Cisco CCNA exam, you will be expected to know how to configure VTP Client
and Server mode.
Certification Level:
This lab is suitable for both CCENT and CCNA certification exam preparation
Lab Difficulty:
This lab has a difficulty rating of 5/10
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than
15 minutes

10


Lab Topology:
Please use the following topology to complete this lab exercise:

Task 1:

In preparation for VLAN configuration, configure a hostname on Sw1 as well as the VLANs
depicted in the topology. Keep in mind that the default mode of operation of Cisco Catalyst
switches is VTP Server mode.
Task 2:
Configure and verify Sw1 as a VTP Server switch and configure Sw2 as a VTP Client switch.
Both switches should be in the VTP domain named CISCO.
Task 3:
Configure and verify FastEthernet0/1 between Sw1 and Sw2 as an 802.1q trunk
Task 4:
Configure and verify VLANs 10 and 20 on Sw1 with the names provided above. Assign
FastEthernet0/2 on both Sw1 and Sw2 to VLAN 10. This interface should be configured as an
access port.
Task 5:
Configure R1 and R3 FastEthernet0/0 interfaces with the IP addresses 10.0.0.1/28 and
10.0.0.3/28 respectively. Test connectivity via your VLANs by pinging R1 from R3 and vice
versa.

11


SOLUTION:
Lab 3 Configuration and Verification
Task 1:
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw1
Sw1(config)#
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw2

Sw1(config)#
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#
Task 2:
NOTE: By default, Cisco switches are VTP servers so no configuration is necessary for
Server mode on Sw1. This can be verified using the show vtp status command. However, we
do need to configure the domain.
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#vtp domain CISCO
Changing VTP domain name from Null to CISCO
Sw1(config)#

12


Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#vtp mode client
Setting device to VTP CLIENT mode.
Sw2(config)#vtp domain CISCO
Changing VTP domain name from Null to CISCO
Sw2(config)#end
Sw1#show vtp status

VTP Version
:2
Configuration Revision
:7
Maximum VLANs supported locally : 250
Number of existing VLANs
:7
VTP Operating Mode
: Client
VTP Domain Name
: CISCO
VTP Pruning Mode
: Enabled
VTP V2 Mode
: Disabled
VTP Traps Generation
: Disabled
MD5 digest
: 0x9D 0x1A 0x9D 0x16 0x9E 0xD1 0x38 0x59
Configuration last modified by 10.1.1.3 at 3-1-93 01:42:39
Task 3:
NOTE: By default Cisco switches default to 802.1q trunking so no explicit configuration is
required.
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#interface fastethernet0/1
Sw1(config-if)#switchport mode trunk
Sw1#show interfaces trunk
Port
Fa0/1

Port
Fa0/1
Port

Mode
on

Encapsulation Status
802.1q

trunking

Native vlan
1

Vlans allowed on trunk
1-4094
Vlans allowed and active in management domain

13


Fa0/1
Port
Fa0/1

1,10,20
Vlans in spanning tree forwarding state and not pruned
1,20


Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#interface fastethernet0/1
Sw2(config-if)#switchport mode trunk
Sw2#show interfaces trunk
Port
Fa0/1
Port
Fa0/1
Port
Fa0/1
Port
Fa0/1

Mode
on

Encapsulation Status
802.1q

trunking

Native vlan
1

Vlans allowed on trunk
1-4094
Vlans allowed and active in management domain
1,10,20
Vlans in spanning tree forwarding state and not pruned

1,20

Task 4:
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#vlan 10
Sw1(config-vlan)#name SALES
Sw1(config-vlan)#exit
Sw1(config)#vlan 20
Sw1(config-vlan)#name MANAGERS
Sw1(config-vlan)#exit
Sw1(config)#interface fastethernet0/2
Sw1(config-if)#switchport mode access

14


Sw1(config-if)#switchport access vlan 10
Sw1(config-if)#end
Sw1#
Sw1#show vlan brief
VLAN Name
Status Ports
---- -------------------------------- --------- ------------------------------1
default
active
Fa0/1, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16

Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gi0/1, Gi0/2
10
SALES
active
Fa0/2
20
MANAGERS
active
1002 fddi-default
active
1003 token-ring-default
active
1004 fddinet-default
active
1005 trnet-default
active
Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#interface fastethernet0/2
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 10
Sw2(config-if)#end
Sw2#
Sw2#show vlan brief
VLAN Name
Status Ports
---- -------------------------------- --------- ------------------------------1
default

active
Fa0/1, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gi0/1, Gi0/2
10
SALES
active
Fa0/2
20
MANAGERS
active
1002 fddi-default
active
1003 token-ring-default
active
1004 fddinet-default
active
1005 trnet-default
active

15


Task 5:
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.

R1(config)#interface fastethernet0/0
R1(config-if)#ip address 10.0.0.1 255.255.255.240
R1(config-if)#no shutdown
R1(config-if)#end
R1#
R3#config t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface fastethernet0/0
R3(config-if)#ip address 10.0.0.3 255.255.255.240
R3(config-if)#no shutdown
R3(config-if)#end
R3#
R1#show ip interface brief
Interface
FastEthernet0/0

IP-Address
10.0.0.1

OK? Method Status

Protocol

YES manual up

up

R1#ping 10.0.0.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.3, timeout is 2 seconds:

.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/3/4 ms
NOTE: The first PING packet times out due to ARP resolution. Subsequent packets will be
successful.
R3#show ip interface brief
Interface
FastEthernet0/0

IP-Address
10.0.0.3

OK? Method Status
YES manual up

Protocol
up

16


R3#ping 10.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms

Lab 4: Configuring VTP Transparent Mode
Lab Objective:
The objective of this lab exercise is for you to learn and understand how to configure VTP
Transparent mode on Cisco Catalyst switches. By default, all Cisco switches are VTP Server

devices.
Lab Purpose:
VTP Transparent mode configuration is a fundamental skill. VLANs configured on a switch in
VTP Transparent mode are not automatically propagated to other switches within the same
VTP domain as would be done by a VTP Server. Switches configured in VTP Transparent mode
use a trunk to forward traffic for configured VLANs to other switches. As a Cisco engineer, as
well as in the Cisco CCNA exam, you will be expected to know how to configure VTP
Transparent mode.
Certification Level:
This lab is suitable for both CCENT and CCNA certification exam preparation
Lab Difficulty:
This lab has a difficulty rating of 5/10
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than
15 minutes

17


Lab Topology:
Please use the following topology to complete this lab exercise:

Task 1:
In preparation for VLAN configuration, configure a hostname on switches 1 and 2 and routers 1
and 3 as illustrated in the topology.
Task 2:
Configure and verify Sw1 and Sw2 in VTP Transparent mode. Both switches should be in the
VTP domain named CISCO. Remember that switches must be in the same VTP domain to share
VLAN information via a trunk.
Task 3:

Configure and verify FastEthernet0/1 between Sw1 and Sw2 as an 802.1q trunk.
Task 4:
Configure and verify VLANs 2010 and 2030 on Sw1 with the names provided above. Assign
FastEthernet0/2 on Sw1 to VLAN 2010 as an access port. Configure and verify VLANs 2010 and
2040 on Sw2 with the names provided above. Assign FastEthernet0/2 on Sw2 to VLAN 2010 as
an access port.
Task 5:
Configure R1 and R3 FastEthernet interfaces with the IP addresses 10.0.0.1/28 and
10.0.0.3/28 respectively. Test VLAN connectivity by pinging between R1 and R3.
SOLUTION:
Lab 4 Configuration and Verification
Task 1:
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.

18


Switch(config)#hostname Sw1
Sw1(config)#
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw2
Sw1(config)#
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname R3
R3(config)#
Task 2:
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#vtp mode transparent
Setting device to VTP TRANSPARENT mode.
Sw1(config)#end
Sw1#show vtp status
VTP Version
:2
Configuration Revision
:2
Maximum VLANs supported locally : 250
Number of existing VLANs
:5
VTP Operating Mode
: Transparent
VTP Domain Name
: CISCO
VTP Pruning Mode
: Enabled
VTP V2 Mode
: Disabled
VTP Traps Generation
: Disabled
MD5 digest
: 0x9D 0x1A 0x9D 0x16 0x9E 0xD1 0x38 0x59
Configuration last modified by 10.1.1.3 at 3-1-93 01:42:39


19


Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#vtp mode transparent
Setting device to VTP TRANSPARENT mode.
Sw2(config)#end
Sw2#show vtp status
VTP Version
Configuration Revision

:2
:2

Maximum VLANs supported locally : 250
Number of existing VLANs

:5

VTP Operating Mode

: Transparent

VTP Domain Name

: CISCO

VTP Pruning Mode


: Enabled

VTP V2 Mode
VTP Traps Generation
MD5 digest

: Disabled
: Disabled
: 0x9D 0x1A 0x9D 0x16 0x9E 0xD1 0x38 0x59

Configuration last modified by 10.1.1.3 at 3-1-93 01:42:45
Task 3:
NOTE: By default Cisco switches default to 802.1q trunking so no explicit configuration is
required.
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#interface fastethernet0/1
Sw1(config-if)#switchport mode trunk
Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#interface fastethernet0/1
Sw2(config-if)#switchport mode trunk

20


Task 4:
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#vlan 2010

Sw1(config-vlan)#name SALES
Sw1(config-vlan)#exit
Sw1(config)#vlan 2030
Sw1(config-vlan)#name MANAGEMENT
Sw1(config-vlan)#exit
Sw1(config)#interface fastethernet0/2
Sw1(config-if)#switchport mode access
Sw1(config-if)#switchport access vlan 2010
Sw1(config-if)#end
Sw1#
Sw1#show vlan brief
VLAN Name
Status Ports
---- -------------------------------- --------- ------------------------------1
default
active
Fa0/1, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gi0/1, Gi0/2
1002 fddi-default
active
1003 token-ring-default
active
1004 fddinet-default
active
1005 trnet-default

active
2010 SALES
active
Fa0/2
2030 MANAGEMENT
active
Sw2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw2(config)#vlan 2010
Sw2(config-vlan)#name SALES
Sw2(config-vlan)#exit

21


Sw2(config)#vlan 2040
Sw2(config-vlan)#name DIRECTORS
Sw2(config-vlan)#exit
Sw2(config)#interface fastethernet0/2
Sw2(config-if)#switchport mode access
Sw2(config-if)#switchport access vlan 2010
Sw2(config-if)#end
Sw2#

Sw2#show vlan brief
VLAN Name
Status Ports
---- -------------------------------- --------- ------------------------------1
default
active

Fa0/1, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gi0/1, Gi0/2
1002 fddi-default
active
1003 token-ring-default
active
1004 fddinet-default
active
1005 trnet-default
active
2010 SALES
active
Fa0/2
2040 DIRECTORS
active
NOTE: By default switches configured for VTP Transparent mode do not exchange VLAN
information. You can see in the above output that VLAN 2030 on Sw1 is not propagated to
Sw2, and VLAN 2040 on Sw2 is not propagated to Sw1. In Transparent mode, all VLANs
must be manually configured on all switches.
Task 5:
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface fastethernet0/0
R1(config-if)#ip address 10.0.0.1 255.255.255.240
R1(config-if)#no shutdown

R1(config-if)#end
R3#config t

22


Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface fastethernet0/0
R3(config-if)#ip address 10.0.0.3 255.255.255.240
R3(config-if)#no shutdown
R3(config-if)#end
R1#show ip interface brief
Interface
FastEthernet0/0

IP-Address
10.0.0.1

OK? Method Status

Protocol

YES manual up

up

R1#ping 10.0.0.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.3, timeout is 2 seconds:
.!!!!

Success rate is 80 percent (4/5), round-trip min/avg/max = 1/3/4 ms
NOTE: The first PING packet times out due to ARP resolution. Subsequent packets will be
successful.
R3#show ip interface brief
Interface
FastEthernet0/0

IP-Address
10.0.0.3

OK? Method Status

Protocol

YES manual up

up

R3#ping 10.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms

23


Lab 5: Securing VTP Domains
Lab Objective:
The objective of this lab exercise is for you to learn and understand how to secure VTP

domains using Cisco Catalyst switches. By default, VTP domains are not password-protected.
Lab Purpose:
Securing the VTP domain is a fundamental skill. When VTP domains are not configured with a
password, rogue switches can be added to the network and disrupt service. As a Cisco
engineer, as well as in the Cisco CCNA exam, you will be expected to know how to configure
VTP passwords.
Certification Level:
This lab is suitable for both CCENT and CCNA certification exam preparation
Lab Difficulty:
This lab has a difficulty rating of 4/10
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than
5 minutes
Lab Topology:
Please use the following topology to complete this lab exercise:

Task 1:
In preparation for VLAN configuration, configure a hostname on Sw1 and as depicted in the
topology.
Task 2:
Configure and verify Sw1 as a VTP Server switch and configure Sw2 as a VTP Client switch.
Both switches should be in the VTP domain named CISCO. Secure VTP messages with the VTP
password CISCO.

24


Task 3:
Configure and verify FastEthernet0/1 between Sw1 and Sw2 as an 802.1q trunk.
Task 4:

Configure and verify VLANs 10 and 20 on Sw1 with the names provided above. Validate that
these VLANs are still propagated to Sw2 after VTP has been secured.
SOLUTION:
Lab 5 Configuration and Verification
Task 1:
For reference information on configuring hostnames, please refer to:
Lab 1 Configuration and Verification Task 1
Lab 3 Configuration and Verification Task 1
Task 2:
NOTE: By default, Cisco switches are VTP servers so no configuration is necessary for
Server mode on Sw1. This can be verified using the show vtp status command. However, we
do need to configure the domain.
Sw1#config t
Enter configuration commands, one per line. End with CNTL/Z.
Sw1(config)#vtp domain CISCO
Changing VTP domain name from Null to CISCO
Sw1(config)#vtp password CISCO
Setting device VLAN database password to CISCO
Sw1#show vtp status
VTP Version
:2
Configuration Revision
:2
Maximum VLANs supported locally : 250
Number of existing VLANs
:5
VTP Operating Mode
: Server
VTP Domain Name
: CISCO

VTP Pruning Mode
: Enabled
VTP V2 Mode
: Disabled
VTP Traps Generation
: Disabled
MD5 digest
: 0x00 0x7A 0x5E 0x47 0xF1 0xDD 0xB5 0x30
Sw2#config t

25


Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×